This Windows-based software allows to know the user's activities in remote computers; by logging in continuous mode the pressed keys and screen shots of the active applications. BlazingTools Perfect Keylogger works totally hidden from the user's eyes; even this is absolutely undetectable by experts, thanks to its modular design.

An interesting feature are its administration capabilities, allowing adjustments and even software updates without the user being warned; this feature makes it effective, especially in large LAN environments, where it is required to monitor many computers without the user's knowledge. In the same way, its installation can be done in a totally remote way, avoiding suspicions of the users.

The program can send keystrokes logs and screenshots by e-mail or upload them to FTP servers.

Support remote installation, update and uninstall.

The Log files are encrypted and optionally password protected.

Include log viewing and management capabilities.

The program's main function is to record the activity performed by the user on the monitored computer; it includes the keys pressed, applications started, on these the system registers the activity taking periodic screen shots at intervals defined by the administrator. In addition, it can record Internet browsing activities, supporting Google Chrome, Internet Explorer, Firefox, and Opera. Another feature is its ability to capture conversations via chat, supporting the most popular applications.

The recorded activities are stored in hidden and password encrypted files, in order to avoid their interception. In addition, the log files are sent via email or uploaded to FTP servers periodically, according to the system administrator's setting.

Log files can be viewed and managed from the remote administrator console. In summary, BlazingTools Perfect Keylogger is an effective application, to monitor computer user's activities, thanks to its design that allows it to be invisible; its characteristics are advanced, and the application cost is reasonable.

Pros: This utility, allows me to know exactly what my teenagers do on the computer, without the need to have to bother asking for the passwords of their social networks or chats. It has proven to be very effective, and I assure you that it is totally invisible.